Impact
A stack-based buffer overflow exists in the formSetPassword function of the Belkin F9K1122 Parameter Handler. Manipulation of the webpage argument can overflow a stack buffer, enabling an attacker to execute arbitrary code on the device. The vulnerability is identified as CWE‑119 and CWE‑121.
Affected Systems
The affected vendor is Belkin. The impacted product is the F9K1122 router running firmware version 1.00.33. No other products or versions are listed in the advisory.
Risk and Exploitability
The CVSS base score is 8.7, indicating high severity, and the exploit is publicly available. No EPSS score is published, and the vulnerability is not listed in the CISA KEV catalog. Attackers can use network-based HTTP requests to the /goform/formSetPassword endpoint to trigger the overflow, so the attack vector is remote network access. Due to the high severity and public exploit, the risk is significant.
OpenCVE Enrichment